Search results for: malware patterns
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2760

Search results for: malware patterns

2730 Quality Assurance in Software Design Patterns

Authors: Rabbia Tariq, Hannan Sajjad, Mehreen Sirshar

Abstract:

Design patterns are widely used to make the process of development easier as they greatly help the developers to develop the software. Different design patterns have been introduced till now but the behavior of same design pattern may differ in different domains that can lead to the wrong selection of the design pattern. The paper aims to discover the design patterns that suits best with respect to their domain thereby helping the developers to choose an effective design pattern. It presents the comprehensive analysis of design patterns based on different methodologies that include simulation, case study and comparison of various algorithms. Due to the difference of the domain the methodology used in one domain may be inapplicable to the other domain. The paper draws a conclusion based on strength and limitation of each design pattern in their respective domain.

Keywords: design patterns, evaluation, quality assurance, software domains

Procedia PDF Downloads 497
2729 Improving Search Engine Performance by Removing Indexes to Malicious URLs

Authors: Durga Toshniwal, Lokesh Agrawal

Abstract:

As the web continues to play an increasing role in information exchange, and conducting daily activities, computer users have become the target of miscreants which infects hosts with malware or adware for financial gains. Unfortunately, even a single visit to compromised web site enables the attacker to detect vulnerabilities in the user’s applications and force the downloading of multitude of malware binaries. We provide an approach to effectively scan the so-called drive-by downloads on the Internet. Drive-by downloads are result of URLs that attempt to exploit their visitors and cause malware to be installed and run automatically. To scan the web for malicious pages, the first step is to use a crawler to collect URLs that live on the Internet, and then to apply fast prefiltering techniques to reduce the amount of pages that are needed to be examined by precise, but slower, analysis tools (such as honey clients or antivirus programs). Although the technique is effective, it requires a substantial amount of resources. A main reason is that the crawler encounters many pages on the web that are legitimate and needs to be filtered. In this paper, to characterize the nature of this rising threat, we present implementation of a web crawler on Python, an approach to search the web more efficiently for pages that are likely to be malicious, filtering benign pages and passing remaining pages to antivirus program for detection of malwares. Our approaches starts from an initial seed of known, malicious web pages. Using these seeds, our system generates search engines queries to identify other malicious pages that are similar to the ones in the initial seed. By doing so, it leverages the crawling infrastructure of search engines to retrieve URLs that are much more likely to be malicious than a random page on the web. The results shows that this guided approach is able to identify malicious web pages more efficiently when compared to random crawling-based approaches.

Keywords: web crawler, malwares, seeds, drive-by-downloads, security

Procedia PDF Downloads 217
2728 Metamorphic Computer Virus Classification Using Hidden Markov Model

Authors: Babak Bashari Rad

Abstract:

A metamorphic computer virus uses different code transformation techniques to mutate its body in duplicated instances. Characteristics and function of new instances are mostly similar to their parents, but they cannot be easily detected by the majority of antivirus in market, as they depend on string signature-based detection techniques. The purpose of this research is to propose a Hidden Markov Model for classification of metamorphic viruses in executable files. In the proposed solution, portable executable files are inspected to extract the instructions opcodes needed for the examination of code. A Hidden Markov Model trained on portable executable files is employed to classify the metamorphic viruses of the same family. The proposed model is able to generate and recognize common statistical features of mutated code. The model has been evaluated by examining the model on a test data set. The performance of the model has been practically tested and evaluated based on False Positive Rate, Detection Rate and Overall Accuracy. The result showed an acceptable performance with high average of 99.7% Detection Rate.

Keywords: malware classification, computer virus classification, metamorphic virus, metamorphic malware, Hidden Markov Model

Procedia PDF Downloads 297
2727 The Development of Micro Patterns Using Benchtop Lithography for Marine Antifouling Applications

Authors: Felicia Wong Yen Myan, James Walker

Abstract:

Development of micro topographies usually begins with the fabrication of a master stamp. Fabrication of such small structures can be technically challenging and expensive. These techniques are often used for applications where patterns only cover a small surface area (e.g. semiconductors, microfluidic channels). This research investigated the use of benchtop lithography to fabricate patterns with average widths of 50 and 100 microns on silicon wafer substrates. Further development of this method will attempt to layer patterns to create hierarchical structures. Photomasks consisted of patterns printed onto transparency films with a high resolution printer and a fully patterned 10cm by 10cm area has been successfully developed. UV exposure was carried out with a self-made array of ultraviolet LEDs that was positioned a distance above a glass diffuser. Observations under a light microscope and SEM showed that developed patterns exhibit an adequate degree of fidelity with patterns from the master stamp.

Keywords: lithography, antifouling, marine, microtopography

Procedia PDF Downloads 270
2726 Biomorphic Ornaments in Islamic Architecture and Their Development

Authors: Esra Alhamal

Abstract:

Islamic architecture is known for the ornamental patterns that cover the architectural surfaces: floors, walls, and ceilings. This quality in Islamic buildings has long impressed other civilisation, and it is a visual language that exists across the Islamic lands. Ornamentation is divided into three types: geometry, biomorphs, and Arabic calligraphy. The focus of this study is the biomorphic ornaments. This paper will aim to define and characterise biomorphic patterns and trace their development from the 7th to the 18th centuries. Although the time period is seemingly long, the biomorphic patterns and their motifs have been consistent and supported by a geometric system underlying the free flowing, symmetrical motifs. The methodology of this paper consists of analysing and comparing biomorphic patterns from each Islamic period using rules of geometry and symmetry. The study is concluded with a table showcasing the main motifs and how they developed under each Islamic dynasty. This research is a documentation of the biomorphic language and having this record will help contemporary designers employ biomorphic ornaments thoughtfully.

Keywords: architectural surface, biomorphic patterns, Islamic patterns, Islamic ornamentation

Procedia PDF Downloads 136
2725 Study of Dermatoglyphics Pattern in Patient with Hypertension

Authors: Ajeevan Gautam, Gulam Anwer Khan, Pratibha Pokhrel

Abstract:

Introduction: Dermatoglyphics is the science which deals with the study of dermal ridge configuration on the digits, palms and soles. It is grooved by ridges and forms variety of configurations. The aim of the study was to identify dermal ridge patterns on fingertip of hypertensive patients and in normal population and to compare patterns among them. Methods: The subjects of the study were 130 hypertensives and 130 non-hypertensives cases of Kathmandu Valley aged between 40 to 80 years. Case history was recorded after consent finger prints were taken. Different parameters as whorl, loop, arch and composite patterns were studied and analysed. Result: It revealed, increased whorl pattern in hypertensive. It showed 65.69% whorl, 29.23% loop and 5.07% arch patterns in right hand of hypertensive people. In control, it was found to be 34.46% whorl, 58.15% loop and 5.38% arch patterns respectively. Similarly in left hand 63.69% whorl, 32% loop and 4.30% arch in hypertensive group. In control group it was 60.15% as loop, 35.69% as whorl and 15% as arch. Discussion: Based on findings of the result, it was concluded that the whorl, loop and arch patterns observed as 65.69%, 29.23% and 5.07% respectively in hypertensive cases in right hand. Similarly in left hand, it was found to be 4.30% as arch, 32% as loop and 63.69% as whorl patterns, but in normotensive subjects these patterns were recorded as 36.43%, 58.15%, 5.38% in right hand and 35.69%, 60.15%, 4.15% in left hand as whorl, loop and arch respectively.

Keywords: arch, dermatoglyphics, hypertension, loop, whorl

Procedia PDF Downloads 275
2724 Enhancement of Light Out Efficiency of PLED Device Employing Designed Substrate Combined with Nano-Line Patterns

Authors: Ting-Ting Wen, H. C. Lin

Abstract:

This paper reports a study for the light outcoupling efficiency of the PLED device. In use of a designed substrate combined with nano-line patterns in PLED device, the light outcoupling efficiency can be significantly enhanced. The designed substrate was made by UV imprinting technology, such as triangular microlens arrays on the front and periodic corrugated patterns on the back surface. The nano-line patterns in PLED device was fabricated by advanced microstamping and ink-jet printing techniques. For high angles of observation with respect to the substrate surface normal, the light out intensity of the developed PLED device is increased from 0.05 (a.u.) up to 0.69 (a.u.) at the view angle 85 degree. The designed integration leads to 64% increase of the light out intensity compared with the conventional PLED device.

Keywords: triangular microlens, corrugation patterns, nano-line patterns, PLED device, UV imprinting technology, microstamping

Procedia PDF Downloads 460
2723 Setting Ground for Improvement of Knowledge Managament System in the Educational Organization

Authors: Mladen Djuric, Ivan Janicijevic, Sasa Lazarevic

Abstract:

One of the organizational issues is how to develop and shape decision making and knowledge management systems which will continually avoid traps of both paralyses by analyses“ and extinction by instinct“, the concepts that are a kind of tolerant limits anti-patterns which define what we can call decision making and knowledge management patterns control zone. This paper discusses potentials for development of a core base for recognizing, capturing, and analyzing anti-patterns in the educational organization, thus creating a space for improving decision making and knowledge management processes in education.

Keywords: anti-patterns, decision making, education, knowledge management

Procedia PDF Downloads 608
2722 Mouthing Patterns in Indian Sign Language

Authors: Neha Kulshreshtha

Abstract:

This paper examines the patterns of 'Mouthing', a non-manual marker, and its distribution in Indian Sign Language (ISL). Linguistic research in Indian Sign Language is an emerging field where much is needed to be done. The little research which has happened focuses on the structure of ISL in terms of physical or manual markers, therefore a study of mouthing patterns would give an insight into the distribution of this particular non-manual marker. Data has been collected with the help of native ISL users through various techniques in which natural signs can be captured, for example, storytelling, informal conversations etc. The aim of the study is to find out the various situations where mouthing is used. Sometimes, the mouthing is not actually the articulation of the word as spoken in the local languages. The paper aims to find out whether the mouthing patterns in ISL are influenced by any local language or they are independent of any influence from the local language or both. Mouthing patterns have been studied in many sign languages and an investigation into ISL will reveal whether it falls in pattern with the other sign languages.

Keywords: Indian sign language, mouthing, non-manual marker, spoken language influence

Procedia PDF Downloads 234
2721 Using Eye-Tracking to Investigate TEM Validity and Design

Authors: Cao Xi

Abstract:

This paper reports a study which used eye-tracking to examine the cognitive validity of TEM 8(Test for English Majors, Band 8). The study investigated test takers' reading patterns on four -item types using eye-tracking, and interviews. Thirty participants completed 22 items on a computer, with the Tobii X2 Eye Tracker recording their eye movements on screen. Eleven students further participated in a recall interview while viewing video footage of their gaze patterns on the test. The findings will indicate that first, different reading item types will employ different cognitive processes; then different reading patterns for stronger and weaker test takers’on each item types. The implication of this study is to provide recommendations for the use of eye tracking technology in language research.

Keywords: eye tracking, reading patterns, test for english majors, cognitive validity

Procedia PDF Downloads 129
2720 Detection of Cyberattacks on the Metaverse Based on First-Order Logic

Authors: Sulaiman Al Amro

Abstract:

There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.

Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic

Procedia PDF Downloads 21
2719 Neuro-Fuzzy Based Model for Phrase Level Emotion Understanding

Authors: Vadivel Ayyasamy

Abstract:

The present approach deals with the identification of Emotions and classification of Emotional patterns at Phrase-level with respect to Positive and Negative Orientation. The proposed approach considers emotion triggered terms, its co-occurrence terms and also associated sentences for recognizing emotions. The proposed approach uses Part of Speech Tagging and Emotion Actifiers for classification. Here sentence patterns are broken into phrases and Neuro-Fuzzy model is used to classify which results in 16 patterns of emotional phrases. Suitable intensities are assigned for capturing the degree of emotion contents that exist in semantics of patterns. These emotional phrases are assigned weights which supports in deciding the Positive and Negative Orientation of emotions. The approach uses web documents for experimental purpose and the proposed classification approach performs well and achieves good F-Scores.

Keywords: emotions, sentences, phrases, classification, patterns, fuzzy, positive orientation, negative orientation

Procedia PDF Downloads 359
2718 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 101
2717 Analysis of Street Utilization Patterns in Makurdi, Benue State, Nigeria

Authors: I. D. Mngutyo, T. T. Gyuse, D. S. A. Alaci, J. Atser

Abstract:

Streets are public spaces that are meaningful to all people because of lack of restriction on streets. Studies show that conditions, activities and people contribute to the success of public spaces. Also, self-organization potential in activity patterns offers a prospect for the revitalization of an urban area. This potential is mostly ignored hence many African streets appear disorganized giving African urban areas an unplanned look. Therefore, this study aims to analyze street utilization patterns and explore the relationship between the pattern of street use and condition of streets in Makurdi.These activity patterns form a data base for the revitalization of public space. Three major and minor arterials streets in nine out of the eleven wards that make up the built up part of Makurdi were purposively selected as units for measurement. A street activity audit was done on streets for activities that can be observed. For activities that cannot be easily observed 4 questionnaires were randomly administered on each of the three streets giving a total of 108 questionnaires. Multivariate statistical tools such as factor analysis and regression will be used to show emerging streets activity patterns and spatial variation among the nine wards.

Keywords: streets, utilization patterns, revitalization, urban design, urban, areas, developing countries

Procedia PDF Downloads 416
2716 The Environmental Influence on Slow Learners' Learning Achievement

Authors: Niphattha Hannapha

Abstract:

This paper examines how the classroom environment influences slow learners’ learning achievement; it focuses on how seating patterns affect students’ behaviours and which patterns best contribute to students’ learning performance. The researcher studied how slow learners’ characteristics and seating patterns influenced their behaviours and performance at Ban Hin Lad School. As a nonparticipant observation, the target groups included 15 slow learners from Prathomsueksa (Grades) 4 and 5. Students’ behaviours were recorded during their learning activities in order to minimize their reading and written expression disorder in Thai language tutorials. The result showed four seating patterns and two behaviors which obstructed students’ learning. The average of both behaviours mostly occurred when students were seated with patterns 1 (the seat facing the door, with the corridor alongside) and 3 (the seat alongside the door, facing the aisle) respectively. Seating patterns 1 and 3 demonstrated visibility (the front and side) of a walking path with two-way movement. However, seating patterns 2 (seating with the door alongside and the aisle at the back) and 4 (sitting with the door at the back and the aisle alongside) demonstrated visibility (the side) of a walking path with one-way movement. In Summary, environmental design is important to enhance concentration in slow learners who have reading and writing disabilities. This study suggests that students should be seated where they can have the least visibility of movement to help them increase continuous learning. That means they can have a better chance of developing reading and writing abilities in comparison with other patterns of seating.

Keywords: slow learning, interior design, interior environment, classroom

Procedia PDF Downloads 187
2715 Examination of the Main Behavioral Patterns of Male and Female Students in Islamic Azad University

Authors: Sobhan Sobhani

Abstract:

This study examined the behavioral patterns of student and their determinants according to the "symbolic interaction" sociological perspective in the form of 7 hypotheses. Behavioral patterns of students were classified in 8 categories: religious, scientific, political, artistic, sporting, national, parents and teachers. They were evaluated by student opinions by a five-point Likert rating scale. The statistical population included all male and female students of Islamic Azad University, Behabahan branch, among which 600 patients (268 females and 332 males) were selected randomly. The following statistical methods were used: frequency and percentage, mean, t-test, Pearson correlation coefficient and multi-way analysis of variance. The results obtained from statistical analysis showed that: 1-There is a significant difference between male and female students in terms of disposition to religious figures, artists, teachers and parents. 2-There is a significant difference between students of urban and rural areas in terms of assuming behavioral patterns of religious, political, scientific, artistic, national figures and teachers. 3-The most important criterion for selecting behavioral patterns of students is intellectual understanding with the pattern. 4-The most important factor influencing the behavioral patterns of male and female students is parents followed by friends. 5-Boys are affected by teachers, the Internet and satellite programs more than girls. Girls assume behavioral patterns from books more than boys. 6-There is a significant difference between students in human sciences, technical, medical and engineering disciplines in terms of selecting religious and political figures as behavioral patterns. 7-There is a significant difference between students belonging to different subcultures in terms of assuming behavioral patterns of religious, scientific and cultural figures. 8-Between the first and fourth year students in terms of selecting behavioral patterns, there is a significant difference only in selecting religious figures. 9-There is a significant negative correlation between the education level of parents and the selection of religious and political figures and teachers. 10-There is a significant negative correlation between family income and the selection of political and religious figures.

Keywords: behavioral patterns, behavioral patterns, male and female students, Islamic Azad University

Procedia PDF Downloads 345
2714 Several Spectrally Non-Arbitrary Ray Patterns of Order 4

Authors: Ling Zhang, Feng Liu

Abstract:

A matrix is called a ray pattern matrix if its entries are either 0 or a ray in complex plane which originates from 0. A ray pattern A of order n is called spectrally arbitrary if the complex matrices in the ray pattern class of A give rise to all possible nth degree complex polynomial. Otherwise, it is said to be spectrally non-arbitrary ray pattern. We call that a spectrally arbitrary ray pattern A of order n is minimally spectrally arbitrary if any nonzero entry of A is replaced, then A is not spectrally arbitrary. In this paper, we find that is not spectrally arbitrary when n equals to 4 for any θ which is greater than or equal to 0 and less than or equal to n. In this article, we give several ray patterns A(θ) of order n that are not spectrally arbitrary for some θ which is greater than or equal to 0 and less than or equal to n. by using the nilpotent-Jacobi method. One example is given in our paper.

Keywords: spectrally arbitrary, nilpotent matrix , ray patterns, sign patterns

Procedia PDF Downloads 157
2713 Learning the Dynamics of Articulated Tracked Vehicles

Authors: Mario Gianni, Manuel A. Ruiz Garcia, Fiora Pirri

Abstract:

In this work, we present a Bayesian non-parametric approach to model the motion control of ATVs. The motion control model is based on a Dirichlet Process-Gaussian Process (DP-GP) mixture model. The DP-GP mixture model provides a flexible representation of patterns of control manoeuvres along trajectories of different lengths and discretizations. The model also estimates the number of patterns, sufficient for modeling the dynamics of the ATV.

Keywords: Dirichlet processes, gaussian mixture models, learning motion patterns, tracked robots for urban search and rescue

Procedia PDF Downloads 429
2712 Social Contact Patterns among School-Age Children in Taiwan

Authors: Dih Ling Luh, Zhi Shih You, Szu Chieh Chen

Abstract:

Social contact patterns among school-age children play an important role in the epidemiology of infectious disease. Since many of the greatest threats to human health are spread by direct person-to-person contact, understanding the spread of respiratory pathogens and patterns of human interactions are public health priorities. This study used social contact diaries to compare the number of contacts per day per participant across different flu/non-flu seasons and weekend/weekday. We also present contact properties such as sex, age, masking, setting, frequency, duration, and contact types among school-age children (grades 7–8). The sample size with pair-wise comparisons for the seasons (flu/non-flu) and stratification by location were 54 and 83, respectively. There was no difference in the number of contacts during the flu and non-flu seasons, with averages of 16.3 (S.D. = 12.9) and 14.6 (S.D. = 9.5) people, respectively. Weekdays were associated with 23% and 28% more contacts than weekend days during the non-flu and flu seasons, respectively (p < 0.001) (Wilcoxon signed-rank test).

Keywords: contact patterns, behavior, influenza, social mixing

Procedia PDF Downloads 326
2711 The Design of Decorative Flower Patterns from Suan Sunandha Palace

Authors: Nawaporn Srisarankullawong

Abstract:

The study on the design of decorative flower patterns from Suan Sunandha Palace is the innovative design using flowers grown in Suan Sunandha Palace as the original sources. The research instrument included: 1) the photographs of flowers in watercolors painted by one of the lady in waiting of Her Royal Highness Princess Saisawareepirom as the source for investigating flowers used to grow in Suan Sunandha Palace, 2) pictures of real flowers used to grow in Suan Sunandha Palace, 3) Adobe Illustrator Program and Adobe Photoshop Program in designing the motif and decorative patterns including the prototype. The researcher chose 3 types of Suan Sunandha Palace flowers; moss rose, orchid, and lignum vitae. The details of the flowers were cut down to make simple motifs which were developed for elaborative decoration. There were 4 motifs adapted from moss roses, 3 motifs adapted from orchids, and 3 motifs adapted from lignum vitae. The patterns were used to decorate photo frames, wrapping paper, and gift boxes or souvenir boxes.

Keywords: Suan Sunandha Palace, design of decorative, flower patterns, decorative flower

Procedia PDF Downloads 267
2710 Feeding Patterns and Diarrhea Incidence Among Children in Bangladesh: A Study Using Data from Demographic and Health Survey, 2014

Authors: Iqbal Ahmed Chowdhury

Abstract:

Diarrhea is considered to be one of the influential factors of child death in Bangladesh. While it is known that diarrhea is a water-driven disease, due to the lack of studies, little is known about the extent to which various feeding patterns contribute to such an incidence. Our paper intends to fill this gap by looking into different feeding patterns and their influence on diarrhea incidence among children in Bangladesh. Using data collected for the Demographic and Health Survey, 2014, this paper reveals that feeding patterns can influence the diarrhea incidence among this group of children to a great extent. This paper finds that the incidence of diarrhea is likely to elevate if diarrhea-affected children are fed plain water from any source and any kind of juice. However, breastfeeding, feeding soup or clear broth, prescribed baby food, and clean water from a tube well tend to help fight diarrhea incidence among children in Bangladesh. The results are found to be consistent even after controlling for sociodemographic variables, including age and sex of children, age and education qualification of the parent, and the number of children in the family. The results of this study could contribute to treating diarrhea among children in Bangladesh as well as similar other countries in the world.

Keywords: feeding patterns, diarrhea, Bangladesh, children

Procedia PDF Downloads 91
2709 Design Patterns for Emergency Management Processes

Authors: Tomáš Ludík, Jiří Barta, Josef Navrátil

Abstract:

Natural or human made disasters have a significant negative impact on the environment. At the same time there is an extensive effort to support management and decision making in emergency situations by information technologies. Therefore the purpose of the paper is to propose a design patterns applicable in emergency management, enabling better analysis and design of emergency management processes and therefore easier development and deployment of information systems in the field of emergency management. It will be achieved by detailed analysis of existing emergency management legislation, contingency plans, and information systems. The result is a set of design patterns focused at emergency management processes that enable easier design of emergency plans or development of new information system. These results will have a major impact on the development of new information systems as well as to more effective and faster solving of emergencies.

Keywords: analysis and design, Business Process Modelling Notation, contingency plans, design patterns, emergency management

Procedia PDF Downloads 466
2708 Effect of Multi-Stage Fractured Patterns on Production Improvement of Horizontal Wells

Authors: Armin Shirbazo, Mohammad Vahab, Hamed Lamei Ramandi, Jalal Fahimpour

Abstract:

One of the most effective ways for increasing production in wells that are faced with problems such as pressure depletion and low rate is hydraulic fracturing. Hydraulic fracturing is creating a high permeable path through the reservoir and simulated area around the wellbore. This is very important for low permeability reservoirs, which their production is uneconomical. In this study, the influence of the fracturing pattern in multi-stage fractured horizontal wells is analyzed for a tight, heavy oil reservoir to explore the impact of fracturing patterns on improving oil recovery. The horizontal well has five transverse fractures with the same fracture length, width, height, and conductivity properties. The fracture patterns are divided into four distinct shapes: uniform shape, diamond shape, U shape, and W shape. The results show that different fracturing patterns produce various cumulative production after ten years, and the best pattern can be selected based on the most cumulative production. The result also illustrates that optimum design in fracturing can boost the production up to 3% through the permeability distribution around the wellbore and reservoir.

Keywords: multi-stage fracturing, horizontal well, fracture patterns, fracture length, number of stages

Procedia PDF Downloads 199
2707 A Spatial Point Pattern Analysis to Recognize Fail Bit Patterns in Semiconductor Manufacturing

Authors: Youngji Yoo, Seung Hwan Park, Daewoong An, Sung-Shick Kim, Jun-Geol Baek

Abstract:

The yield management system is very important to produce high-quality semiconductor chips in the semiconductor manufacturing process. In order to improve quality of semiconductors, various tests are conducted in the post fabrication (FAB) process. During the test process, large amount of data are collected and the data includes a lot of information about defect. In general, the defect on the wafer is the main causes of yield loss. Therefore, analyzing the defect data is necessary to improve performance of yield prediction. The wafer bin map (WBM) is one of the data collected in the test process and includes defect information such as the fail bit patterns. The fail bit has characteristics of spatial point patterns. Therefore, this paper proposes the feature extraction method using the spatial point pattern analysis. Actual data obtained from the semiconductor process is used for experiments and the experimental result shows that the proposed method is more accurately recognize the fail bit patterns.

Keywords: semiconductor, wafer bin map, feature extraction, spatial point patterns, contour map

Procedia PDF Downloads 365
2706 Risks beyond Cyber in IoT Infrastructure and Services

Authors: Mattias Bergstrom

Abstract:

Significance of the Study: This research will provide new insights into the risks with digital embedded infrastructure. Through this research, we will analyze each risk and its potential negation strategies, especially for AI and autonomous automation. Moreover, the analysis that is presented in this paper will convey valuable information for future research that can create more stable, secure, and efficient autonomous systems. To learn and understand the risks, a large IoT system was envisioned, and risks with hardware, tampering, and cyberattacks were collected, researched, and evaluated to create a comprehensive understanding of the potential risks. Potential solutions have then been evaluated on an open source IoT hardware setup. This list shows the identified passive and active risks evaluated in the research. Passive Risks: (1) Hardware failures- Critical Systems relying on high rate data and data quality are growing; SCADA systems for infrastructure are good examples of such systems. (2) Hardware delivers erroneous data- Sensors break, and when they do so, they don’t always go silent; they can keep going, just that the data they deliver is garbage, and if that data is not filtered out, it becomes disruptive noise in the system. (3) Bad Hardware injection- Erroneous generated sensor data can be pumped into a system by malicious actors with the intent to create disruptive noise in critical systems. (4) Data gravity- The weight of the data collected will affect Data-Mobility. (5) Cost inhibitors- Running services that need huge centralized computing is cost inhibiting. Large complex AI can be extremely expensive to run. Active Risks: Denial of Service- It is one of the most simple attacks, where an attacker just overloads the system with bogus requests so that valid requests disappear in the noise. Malware- Malware can be anything from simple viruses to complex botnets created with specific goals, where the creator is stealing computer power and bandwidth from you to attack someone else. Ransomware- It is a kind of malware, but it is so different in its implementation that it is worth its own mention. The goal with these pieces of software is to encrypt your system so that it can only be unlocked with a key that is held for ransom. DNS spoofing- By spoofing DNS calls, valid requests and data dumps can be sent to bad destinations, where the data can be extracted for extortion or to corrupt and re-inject into a running system creating a data echo noise loop. After testing multiple potential solutions. We found that the most prominent solution to these risks was to use a Peer 2 Peer consensus algorithm over a blockchain to validate the data and behavior of the devices (sensors, storage, and computing) in the system. By the devices autonomously policing themselves for deviant behavior, all risks listed above can be negated. In conclusion, an Internet middleware that provides these features would be an easy and secure solution to any future autonomous IoT deployments. As it provides separation from the open Internet, at the same time, it is accessible over the blockchain keys.

Keywords: IoT, security, infrastructure, SCADA, blockchain, AI

Procedia PDF Downloads 83
2705 Spatial Scale of Clustering of Residential Burglary and Its Dependence on Temporal Scale

Authors: Mohammed A. Alazawi, Shiguo Jiang, Steven F. Messner

Abstract:

Research has long focused on two main spatial aspects of crime: spatial patterns and spatial processes. When analyzing these patterns and processes, a key issue has been to determine the proper spatial scale. In addition, it is important to consider the possibility that these patterns and processes might differ appreciably for different temporal scales and might vary across geographic units of analysis. We examine the spatial-temporal dependence of residential burglary. This dependence is tested at varying geographical scales and temporal aggregations. The analyses are based on recorded incidents of crime in Columbus, Ohio during the 1994-2002 period. We implement point pattern analysis on the crime points using Ripley’s K function. The results indicate that spatial point patterns of residential burglary reveal spatial scales of clustering relatively larger than the average size of census tracts of the study area. Also, spatial scale is independent of temporal scale. The results of our analyses concerning the geographic scale of spatial patterns and processes can inform the development of effective policies for crime control.

Keywords: inhomogeneous K function, residential burglary, spatial point pattern, spatial scale, temporal scale

Procedia PDF Downloads 320
2704 Design Systems and the Need for a Usability Method: Assessing the Fitness of Components and Interaction Patterns in Design Systems Using Atmosphere Methodology

Authors: Patrik Johansson, Selina Mardh

Abstract:

The present study proposes a usability test method, Atmosphere, to assess the fitness of components and interaction patterns of design systems. The method covers the user’s perception of the components of the system, the efficiency of the logic of the interaction patterns, perceived ease of use as well as the user’s understanding of the intended outcome of interactions. These aspects are assessed by combining measures of first impression, visual affordance and expectancy. The method was applied to a design system developed for the design of an electronic health record system. The study was conducted involving 15 healthcare personnel. It could be concluded that the Atmosphere method provides tangible data that enable human-computer interaction practitioners to analyze and categorize components and patterns based on perceived usability, success rate of identifying interactive components and success rate of understanding components and interaction patterns intended outcome.

Keywords: atomic design, atmosphere methodology, design system, expectancy testing, first impression testing, usability testing, visual affordance testing

Procedia PDF Downloads 151
2703 Natural Patterns for Sustainable Cooling in the Architecture of Residential Buildings in Iran (Hot and Dry Climate)

Authors: Elnaz Abbasian, Mohsen Faizi

Abstract:

In its thousand-year development, architecture has gained valuable patterns. Iran’s desert regions possess developed patterns of traditional architecture and outstanding skeletal features. Unfortunately increasing population and urbanization growth in the past decade as well as the lack of harmony with environment’s texture has destroyed such permanent concepts in the building’s skeleton, causing a lot of energy waste in the modern architecture. The important question is how cooling patterns of Iran’s traditional architecture can be used in a new way in the modern architecture of residential buildings? This research is library-based and documental that looks at sustainable development, analyzes the features of Iranian architecture in hot and dry climate in terms of sustainability as well as historical patterns, and makes a model for real environment. By methodological analysis of past, it intends to suggest a new pattern for residential buildings’ cooling in Iran’s hot and dry climate which is in full accordance to the ecology of the design and at the same time possesses the architectural indices of the past. In the process of cities’ physical development, ecological measures, in proportion to desert’s natural background and climate conditions, has kept the natural fences, preventing buildings from facing climate adversities. Designing and construction of buildings with this viewpoint can reduce the energy needed for maintaining and regulating environmental conditions and with the use of appropriate building technology help minimizing the consumption of fossil fuels while having permanent patterns of desert buildings’ architecture.

Keywords: sustainability concepts, sustainable development, energy climate architecture, fossil fuel, hot and dry climate, patterns of traditional sustainability for residential buildings, modern pattern of cooling

Procedia PDF Downloads 284
2702 The Effectiveness of Sexual Cognitive Behavioral Therapy on Strategic Thinking and Communication Patterns of Couples in Colostomy Patients

Authors: Alireza Monzavi Chaleshtari, Mahnaz Aliakbari Dehkordi, Seyedeh Somayeh Amiri, Mozhgan Shakhseniaei, Amin Asadi Hieh

Abstract:

The purpose of this research was to determine the effectiveness of sexual cognitive behavioral therapy on strategic thinking and communication patterns of couples in colostomy patients. In this study, experimental research was conducted with a pre-test and post-test design with a control group and a follow-up period. The statistical population studied were married female colostomy patients referring to the Iranian Ostomy Association. 30 qualified people were selected by voluntary sampling and randomly divided into two experimental and control groups (15 people in each group). Both groups responded to Goleman's strategic thinking (2007) and the communication patterns of Christensen and Sulawai questionnaires (1984). The results of covariance analysis showed that sexual cognitive behavioral therapy has an effect on improving strategic thinking. Based on the results of this test, sexual cognitive behavioral therapy is effective in improving the strategic thinking of colostomy patients until the follow-up stage. Also, sexual cognitive behavioral therapy has an effect on improving the communication patterns of couples in colostomy patients. Based on the results of this test, sexual cognitive behavioral therapy is effective in improving communication patterns of couples in patients with colostomy until the follow-up stage. Based on the results of this research, sexual cognitive behavioral therapy can be used to improve strategic thinking and communication patterns of couples of colostomy patients.

Keywords: sexual cognitive behavioral therapy, strategic thinking, communication patterns of couples, colostomy

Procedia PDF Downloads 51
2701 A Comparative Study of GTC and PSP Algorithms for Mining Sequential Patterns Embedded in Database with Time Constraints

Authors: Safa Adi

Abstract:

This paper will consider the problem of sequential mining patterns embedded in a database by handling the time constraints as defined in the GSP algorithm (level wise algorithms). We will compare two previous approaches GTC and PSP, that resumes the general principles of GSP. Furthermore this paper will discuss PG-hybrid algorithm, that using PSP and GTC. The results show that PSP and GTC are more efficient than GSP. On the other hand, the GTC algorithm performs better than PSP. The PG-hybrid algorithm use PSP algorithm for the two first passes on the database, and GTC approach for the following scans. Experiments show that the hybrid approach is very efficient for short, frequent sequences.

Keywords: database, GTC algorithm, PSP algorithm, sequential patterns, time constraints

Procedia PDF Downloads 364